Programme
| 09:00 | Opening |
| 09:15 | Keynote: Kai Kimppa Ethical social engineering penetration testing – can it be done? |
| 10:15 | Break |
| 10:30 | Session: Informational self determination |
| Violeta Vasileva Consistent Approach of Research for User’s Cyber Awareness, Identity Management and Proposal for Solution in Order to Enhance User’s Competencies in Public Cyberspace |
|
| Rosalie Waelen A loss of informational control due to facial recognition technology: ethical and societal implications |
|
| Alexander Richter and Delphine Reinhardt Exploration of Factors that can Impact the Willingness of Employees to Share Smart Watch Data with their Employers |
|
| 12:00 | Beak |
| 12:30 | Session: Knowledge imbalances |
|
Mario Filipe Cavalcanti and Eneus Trindade
Algorithms and data protection in Brazilian television advertising. |
|
| Joakim Kävrestad, Allex Hagberg, Robert Roos, Jana Rambusch and Marcus Nohlberg Including users with cognitive challenges in the design of usable privacy and security |
|
| Marco Houben Weaponizing data processing agreements for addressing power asymmetry through digital platforms in education |
|
| 14:00 | Break |
| 14:15 | Tutorial |
| End 15:15 | Michael Friedewald and Ina Schiering Implementing Data Protection Impact Assessments in Practice |
| 09:00 | Keynote: Sebastian Pape Serious Games for Security and Privacy Awareness |
| 10:00 | Break |
| 10:15 | Tutorial |
| Felix Bieker The State of Surveillance |
|
| 11:15 | Break |
| 11:30 | Session: Finance and taxes |
| Mylana Pfeiffer Cybersecurity, Data Protection and Taxpayers’ Rights in the EU |
|
| Ine van Zeeland and Jo Pierson From a remedy to an ecosystem: a review of the concept of Open Banking |
|
| 12:30 | Break |
| 13:00 | Session: Privacy modeling |
|
Niklas Sommerer, Martin Latzenhofer and Stefan Schauer
Measuring Privacy within the KRAKEN Database |
|
| Myriam Clouet Towards a Generic Approach for Modeling and Verifying Properties for Preserving Privacy |
|
| Elias Grünewald Cloud Native Privacy Engineering through DevPrivOps |
|
| 14:30 | Break |
| 14:45 | Workshop |
| Harry Halpin and Iness Ben Guirat Usability for Mixnets |
|
| End 15:45 |
| 09:00 | Keynote: François Thill (Ministère de l’Économie, Directeur Cyber Sécurité) TBA |
| 10:00 | Break |
| 10:15 | Tutorial |
| Sandra Schmitz Are we all on the same page? On establishing a common understanding of the state of the art |
|
| 11:15 | Break |
| 11:30 | Session: Location privacy |
|
Tamara Stefanović and Silvia Ghilezan
Privacy Challenges of Digital Contact Tracing |
|
| Rémy Scholler, Jean-François Couchot, Oumaïma Alaoui-Ismaïli, Eric Ballot and Denis Renaud Observing road freight traffic from mobile network signalling data while respecting privacy and business confidentiality |
|
| Amirhossein Adavoudi Jolfaei, Stefan Schiffner, Andy Rupp and Thomas Engel Systematic Literature Review on Privacy-Preserving Electronic Toll Collection |
|
| 13:00 | Break |
| 13:30 | Session: IoT and smart things |
| Nathanaël Denis, Sophie Chabridon and Maryline Laurent Bringing Privacy, Security and Performance to the Internet of Things through Usage Control and Blockchains |
|
| Jorge Pereira Campos The Dynamics of Data Donation: Smart City, e-Participation, and [Privacy] Risk |
|
| Break | |
| 15:00 | Workshop |
|
End 16:00 |
Jorge Bernal Bernabe, Jesus Garcia, Stephan Krenn, Vasia Liagkou, Antonio Skarmeta and Rafael Torres Privacy-Preserving Identity Management |
| 09:00 | Workshop |
| Felix Schaber Practical Privacy-by-Design Where It Matters Most: Analyzing the Whistleblower Submission System SecureDrop Using Systems Theory |
|
| 10:00 | Break |
| 10:15 | Session: e-Health |
|
Claudio Pighini, Alessio Vezzoni, Simone Mainini Andrea G., Migliavacca, Alessandro Montanari, Maria R. Guarneri, Enrico G. Caiani and Ambra Cesareo
SynCare: an Innovative Remote Patient Monitoring System secured by Cryptography and Blockchain |
|
| Aiste Gerybaite What do medical devices, data protection and cybersecurity all have in common? Exploring regulatory interplay in health IoE |
|
|
Yakini Tchouka, Jean-Francois Couchot, Christophe Guyeux and David Laiymani
De-Identification of Medical Records for ICD-10 Codes Association |
|
|
Ramona Schmidt and Ina Schiering
Gamification in mHealth – Opportunities and Privacy Risks |
|
| 12:15 | Break |
| 12:30 | Closing key note: Jakub Čegan, Masaryk University Training Development in KYPO Cyber Range Platform |
| 13:30 13:45 |
End of Event remarks and food for thoughts for the next year |